Package: heartbeat
Severity: serious
Tags: security

According to http://secunia.com/advisories/16039:

> Eric Romang has reported a vulnerability in heartbeat, which can be exploited
> by malicious, local users to perform certain actions on a vulnerable system
> with escalated privileges.

> The vulnerability is caused due to several temporary files being created
> insecurely in "/tmp" by "cts/CTStests.py.in",
> "heartbeat/lib/BasicSanityCheck.in" and "lib/stonith/meatclient.c". This can 
> be
> exploited via symlink attacks to create or overwrite arbitrary files with the
> privileges of the user running the affected application.

> The vulnerability has been reported in versions 1.2.3 and prior.

This has been assigned CAN-2005-2231. I have not verified the holes.

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to